Bun0xd
@bun0xd
Followers
290
Following
2K
Media
45
Statuses
2K
My curated awesome list of cybersecurity research, RE material, exploitation write-ups, and tools. https://t.co/6YgCLKcdUH
#infosec
5
181
1K
''Malware development trick 53: steal data via legit XBOX API. Simple C example.'' #infosec #pentest #redteam #blueteam
https://t.co/eHB5l9cFQe
cocomelonc.github.io
๏ทฝ
2
24
104
THC Release: ๐Smallest SSHD backdoor๐ - Does not add any new file - Survives apt-update - Does not use PAM or authorized_keys Just SSHD trickery....adds one line only. More at https://t.co/zVCLwmbXv2 ๐
5
110
521
In early October 2025, Microsoft disrupted a Vanilla Tempest campaign by revoking over 200 certificates that the threat actor had fraudulently signed and used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware. We identified this
5
52
145
Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code.
specterops.io
DCOM lateral movement BOF using Windows Installer (MSI) Custom Action Server - install ODBC drivers to load and execute DLLs
1
115
284
๐ Secure Bits ๐ก Did you know ๐๐ผ๐ ๐ฐ๐ฎ๐ป ๐ต๐ถ๐ฑ๐ฒ ๐๐ผ๐บ๐ฎ๐ถ๐ป ๐๐ฑ๐บ๐ถ๐ป๐ from standard discoveryโeven from other admins? Active Directory is a โ๐ฟ๐ฒ๐ฎ๐ฑ-๐บ๐ฎ๐ป๐โ ๐ฑ๐ถ๐ฟ๐ฒ๐ฐ๐๐ผ๐ฟ๐ by design. But ๐๐ถ๐๐ ๐ข๐ฏ๐ท๐ฒ๐ฐ๐ ๐ ๐ผ๐ฑ๐ฒ (๐๐ข๐ ) can change that. ๐ต๏ธโโ๏ธ Martin Handl
2
71
374
Active Directory hardening is freeโฆoutside of your time. Overall - PingCastle Passwords - FGPP, LAPS, Lithnet Permissions - ADeleg/ADeleginator Applocker - Applocker Inspector/Applocker gen ADCS - Locksmith Logon scripts - ScriptSentry GPO - GPOZaurr Baselines - CIS/Microsoft
27
176
1K
Great resource by @lazarusholic listing DPRK linked threat actors and related threat reports ๐ https://t.co/cSSunBa5bo
4
52
254
I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - https://t.co/Hh089SaVOS - https://t.co/geO0HXTykf
6
215
631
๐ด Red and blue teams, this one's for you. ๐ต LudusHound bridges BloodHound Attack Paths with lab automation by creating a functional Active Directory replica testing environment. Read @bagelByt3s blog post for more. https://t.co/YOGMEQ8upC
6
79
221
A cool recon trick to find more targets is to check out CSP policies for juicy assets. csprecon can do this for you ๐ https://t.co/FRWS3ImxPF
0
46
209
Google docs now supports export as markdown! This was probably done for LLM's benefit, but it's perfect for regexing into clean, minimalist HTML:
2
13
126
DLL Side-loading and Hijacking โ Using Threat Intelligence to Weaponize R and D https://t.co/yJOHmqfWLI
1
35
172
New research from our #ElasticSecurityLabs team: we dive into how infostealers are leveraging a stolen Shellter evasion tool to deploy data-stealing malware. Learn more & get our unpacker: https://t.co/7IvybAvyuL
#malware #rhadamanthys #ghostpulse
elastic.co
Elastic Security Labs detected the recent emergence of infostealers using an illicitly acquired version of the commercial evasion framework, SHELLTER, to deploy post-exploitation payloads.
2
51
145
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence.
ibm.com
Explore how Azure Arc can be identified in environments, misconfigurations in deployment can allow for privilege escalation, an overprovisioned Service Principal can be used for code execution and...
7
83
189
How to find the Entra ID sync server - A new NetExec module๐ Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server. Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server๐
9
138
497
Credentials access via Shadow Snapshots, WMI and SMB, all done remotely. Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer. A technique developed by Peter
2
84
292
Mini Writeup of CVE-2025-6554. POC by @DarkNavyOrg. All errors in writeup my own. https://t.co/tvzW9t76O5
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
4
34
155
I built a defensive scanner. They used it for privilege escalation. Somewhere, a red teamer is smiling. ๐ https://t.co/QchUrBMaha
9
36
257
Including nice tool release ๐ฅ https://t.co/4v2osVGTfA
github.com
tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it - temp43487580/EntraPassTheCert
1
73
195